Answer:
compillers
Explanation:
computer programs belong in three classes; these are
Machine language (0s and 1s)
Assembly language and Highlevel languages
The popular programming languages like Java, C, C++, Python etc are all examples of high level languages. When programs are written in these highlevel languages, the programs will require another special program called compillers to carryout a translation from the highlevel language to a machine level (0s and 1s) which is the level that is executable by computers.
This is not a computer and technology question but ill still answer it!! They are not
Answer:
C. receiving data.
Explanation:
An information system interacts with its environment by receiving data in its raw forms and information in a usable format.
Information system can be defined as a set of components or computer systems, which is used to collect, store, and process data, as well as dissemination of information, knowledge, and distribution of digital products.
Generally, it is an integral part of human life because individuals, organizations, and institutions rely on information systems in order to perform their duties, functions or tasks and to manage their operations effectively. For example, all organizations make use of information systems for supply chain management, process financial accounts, manage their workforce, and as a marketing channels to reach their customers or potential customers.
Additionally, an information system comprises of five (5) main components;
1. Hardware.
2. Software.
3. Database.
4. Human resources.
5. Telecommunications.
<em>Hence, the information system relies on the data it receives from its environment, processes this data into formats that are usable by the end users. </em>
Answer:
Using a one time password OTP and using a three factor authentication.
Explanation:
Social engineering is a form system and network attack, drafted by an attacker, to steal user credentials needed for accessing their accounts, to steal information.
Social engineering attacks like phishing, spear phishing, baiting and quid quo pro are used to fool users to giving out their user details.
One time password is an implied use of a password just once and a new password his generated to boost security. In a three factor authentication, OTP can be used as well as biometrics of a user which can not be giving away by a user to an attacker.
Answer:
No clue!
can I get brainliest tho-